AGENCY4NET WEBFTP "download2.php" File Disclosure and Deletion
Description
A vulnerability has been identified in AGENCY4NET WEBFTP, which could be exploited by attackers to gain unauthorized access to arbitrary files. This issue is caused by an input validation error in the "download2.php" script that does not validate the "file" parameter before being passed as an argument to "readfile()" and "unlink()" calls, which could be exploited by malicious people to download or delete arbitrary files from a vulnerable server via directory traversal attacks.